Understanding Phishing


In today’s interconnected world, the threat of phishing attacks looms large. Our  Understanding Phishing Course empowers individuals and organisations to defend against this pervasive cyber threat. With expert instruction, real-world case study, and hands-on simulations, you’ll learn to identify phishing attempts, safeguard sensitive data, and strengthen your online security posture.

SKU: N/A Category: Tags: , ,


Understand how phishing emails work in our 2 hour course.

Phishing works by sending messages that look like they are from a legitimate company or website. Phishing messages will usually contain a link that takes the user to a fake website that looks like the real thing.

  1. Define phishing and identify common methods used by scammers
  2. Recognise red flags in phishing emails, messages, or posts
  3. Review email headers
  4. The sender
  5. Spoofing
  6. DKIM / SPF Keys
  7. IP Addresses

Additional information


14th October, 21st October